Search
Now showing items 21-30 of 40
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem
(2018)
In the Internet of Things (IoT) ecosystem the volume of data generated by devices in the user’s environment is constantly increasing and becoming of particular value. In such an environment the average user is bound to ...
An Online Service for Topics and Trends Analysis in Medical Literature
(IFMBE Proceedings, 2018-05)
Topic modeling refers to a suite of probabilistic algorithms for extracting word patterns from a collection of documents aiming for data clustering and detection of research trends. We developed an online service that ...
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology
(International Conference on Security for Information Technology and Communications, 2018)
The value of personal data generated and managed by smartdevices which comprise the Internet of Things (IoT) is unquestionable.The EU General Data Protection Regulation (GDPR) that has beenrecentlyput in force, sets the ...
Deriving the Political Affinity of Twitter Users from Their Followers
(IEEE, 2018)
In this work, we show that Twitter users can reveal valuable political information about particular Nodes of Interest (NOIs) they opt to follow. More precisely, we utilize an interesting graph projection method and a series ...
How much does a zero-permission Android app know about us?
(2019-11)
Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by ...
Privacy Leakages about Political Beliefs through Analysis of Twitter Followers
(Pan-Hellenic Conference on Informatics, 2018-11)
In this paper, we focus on privacy leakages about Twitter usersand show that simply establishing follower and friend connectionsin the Twitter network might be enough to reveal sensitive in-formation about the political ...
Enhancing Deniability against Query-Logs
(Springer, 2011)
We propose a method for search privacy on the Internet, focusing onenhancing plausible deniability against search engine query-logs. The method ap-proximates the target search results, without submitting the intended query ...
A privacy-preserving cloud computing system for creating participatory noise maps
(IEEE, 2012)
Participatory sensing is a crowd-sourcing technique which relies both on active contribution of citizens and on their location and mobility patterns. As such, it is particularly vulnerable to privacy concerns, which may ...
PHUBMIT - A new smart intervention for estimating and mitigating the cell phone induced ostracism (phubbing)
(University Research Institute of Maternal and Child Health and Precision Medicine, 2018)
Phubbing or the cell phone-induced ostracism is defined as “snubbing someone by being busy oneself with one’s mobile phone and ignore social surroundings”. Thus, “phubber” is the subject, whereas, ‘phubbee’ is the target ...
Privacy-Preserving Television Audience Measurement Using Smart TVs
(2012)
Internet-enabled television systems, often referred to as Smart TVs, are a new development in television and home entertainment technologies. In this work, we propose a new, privacy-preserving, approach for Television ...